Unit 1
Unit 1
Mobile Computing
Dr. S. V. Gaikwad
CO2 2
CO3 3
CO4 4
CO5 5
CO6
6
• For example, one would like to put ones room heater on when one is about 15 minutes
away from home.
§ Global Service Portability: Making a service portable and available in every environment. Any
service of any environment will be available globally.
§ Wearable Computers: Wearable computers are those computers that may be adorned by
humans like a hat, shoe or clothes (these are wearable accessories).
DEPARTMENT OF ELECTRONICS AND TELECOMMUNICATION ENGG 15
We can define a computing environment as mobile if it supports one or more of the following
characteristics:
User Mobility:
◦ User should be able to move from one physical location to another location and use the same service.
◦ Example could be a user moves from London to New York and uses Internet to access the corporate
application the same way the user uses in the home office.
• User should be able to move from one network to another network and use the same service.
• Example could be a user moves from Hong Kong to New Delhi and uses the same GSM phone to access the
corporate application through WAP (Wireless Application Protocol). In home network he uses this service
over GPRS (General Packet Radio Service) whereas in Delhi he accesses it over the GSM network.
Bearer Mobility:
• User should be able to move from one bearer to another and use the same service.
• Example could be a user was using a service through WAP bearer in his home network in Bangalore. He moves to
Coimbatore, where WAP is not supported, he switch over to voice or SMS (Short Message Service) bearer to
access the same application.
◦ Example could be sales representatives using their desktop computer in home office. During the day
while they are on the street they would like to use their Palmtop to access the application.
Session Mobility:
◦ A user session should be able to move from one user-agent environment to another.
◦ Example could be a user was using his service through a CDMA (Code Division Multiple Access) network.
The user entered into the basement to park the car and got disconnected from his CDMA network. User
goes to home office and starts using the desktop. The unfinished session in the CDMA device moves from
the mobile device to the desktop computer.
◦ Example could be a user is writing a mail. To complete the mail user needs to refer to some other
information. In a desktop PC, user simply opens another service (browser) and moves between them
using the task bar. User should be able to switch amongst services in small footprint wireless devices
like in the desktop.
Host Mobility:
◦ The user device can be either a client or server.
◦ Cell phones
◦ Pagers : Receiver to display short text messages, pagers integrated into watches
It is mainly used in Cell Phones (2G,3G etc). Spreading Factor=Chip Rate/Data Rate
q Disadvantages
§ Needs large bandwidth communication channel
q Applications
§ FM and AM Radio broadcasting
§ Used in first generation cellular telephone
§ Used in television broadcasting
q Applications
§ SONET Network
q Disadvantages
§ Needs large bandwidth communication channel
than multiple input signals.
q Applications
§ Suitable for digital signal multiplexing
Advantages Applications
q Multiple signals can be sent simultaneously q Communication system
over a single communication channel
q Computer memory
q Effective use of channel bandwidth
q Telephone System
q Multiplexing reduces cost
q TV broadcasting
q Multiplexing reduces circuit complexity
q Telemetry
q Satellites
2. Frequency Hopping
Receiver :
1
�� �� �������� ������ �� ��
�� = = 1 = =N
�� �� �������� ������ �� ��
Probability of Error : In DSSS BPSK system the interference may be treated as a wide band
noise signal with PSD N0
�0 = ���
1 ��
So �� = ����
2 ���
� ��
������� ������ = =
�� � � ��
For FHSS, chip rate = max (Rs, Rh) –> general eq.
For slow FHSS, chip rate = Rs =Rb/N ≥ Rh
For fast FHSS , chip rate =Rh =Rb/N ≥ Rs
PG = (2n * fs)/fs = 2n where n is bits in PN seq per Hop & fs is symbol
frequency
Or
PG = No. of Symbols per Hop X No of bits per Symbol
1 −�� 2�
�� = � �
2
Possible Symbol 00 01 10 11
Frequency for
FH+f1 FH+f2 FH+f3 FH+f4
each symbol
Data symbols 01 10 11 01 10 00
Here we are using 3 different groups of PN sequence so 3 different hopping frequencies used
as FH1, FH6, FH5, Output plot is as shown in figure
Data 01 11 11 10 00 10 01 11 10 10
symbols
PN 110 001
001 011
110 001
001 011
110 001
001 011
110 001
Seq 101 110 101 110 101 110
Here we are using different groups of PN sequence so different hopping frequencies used as FH6,
FH1, FH5, FH3, & so on
Output plot is as shown in figure
Hidden Terminals
q A sends to B, C cannot hear A
q C wants to send to B, C senses a “free” medium (CS fails)
q Collision at B, A cannot receive the collision (CD fails)
q C is “hidden” from A A B C
Exposed Terminals
q B sends to A, C wants to send to D
q C has to wait, CS signals a medium in use
q but A is outside radio range of C, waiting is not
necessary
q C is “exposed” to B
A B C D
q Simple algorithmically, and from a hardware standpoint q Requires right RF filtering to minimize
q Fairly efficient when the number of stations is small and adjacent channel interference
the traffic is uniformly constant q Maximum bit rate per channel is fixed
q Capacity increase can be obtained by reducing q Small inhibiting flexibility in bit rate capability
the information bit rate and using efficient digital code q Does not differ significantly from analog
of modulation. system
q No need for network timing
q No restriction regarding the type of baseband or type
q All terminals send on the same frequency and can use the whole bandwidth of the
transmission channel
q Each sender has a unique code
q The sender XORs the signal with this code
q The receiver can “tune” into this signal if it knows the code of the sender
q Tuning is done via a correlation function
q Higher complexity of the receiver (receiver cannot just listen into the medium
and start receiving if there is a signal)
q All signals should have approximately the same strength at the receiver
q As no of users increases overall quality of service decreases
q Self jamming
q Near, far problem arises